About UsCareersBlogLog In
Cyber Security ResourceCyber Security Resource
  • Home
  • Products
    • IT Security Partnership Program
    • Cyber Security Resource Community
    • Third Party Risk Management
    • Managed Detection and Response
  • Services
    • Cyber Security Risk Assessment
    • HITRUST Readiness Assessment
    • Cyber Security Advisory Services
    • Penetration Test
    • Vulnerability Assessment
  • Solutions
    • Security Awareness & Training
    • Email Phishing
    • Antivirus – Antimalware
  • Resources
    • Cyber Security Resource Library
    • IT Governance
    • Information Security
    • Risk Management
    • Vulnerability Management
    • Incident Response
  • Partners
    • Consultants Network
    • Sales Partners
Facebook
Twitter
LinkedIn
YouTube
About UsCareersBlogLog In

Analysis: Fat Face's Awkward Breach Notification

April 13, 2021AddMgrNo Comments

The latest edition of the ISMG Security Report features an analysis of retailer Fat Face’s awkward “strictly private and confidential” data breach notification to affected customers and employees.

In this report, you’ll hear (click on player beneath image to listen):

  • ISMG’s Mathew Schwartz dissect Fat Face’s breach notification;
  • ISMG’s Jeremy Kirk address the legal and ethical implications of buying breached data;
  • Karen Tsu of Appdome discuss the rise of central bank digital currencies.

The ISMG Security Report appears on this and other ISMG websites on Fridays. Don’t miss the March 19 and March 26 editions, which respectively discuss the Microsoft Exchange Server hacks and takeaways from ransomware gang interviews.

Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.

This post was originally published on this site

AddMgr
Our passion at Cyber Security Resource is to work with IT Security Officers, Risk Managers, IT Managers, and Business Professionals to meet their Compliance and IT Security requirements. We offer IT security risk assessments, network and application penetration testing, and security certification readiness for Hitrust or SOCII.
Previous post What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report Next post Cybersecurity breaches should 'frighten all Americans': Rep. Stewart

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get Our Newsletter

  • Virtual CISO Advisory Services
  • Cyber Security Risk Assessment
  • Vulnerability Assessment
  • Penetration Test
  • Cyber Security Awareness Training

Latest News

  • HITRUST Certification vs HIPAA: What you Need to Know
  • Why Do Businesses Need an Incident Response Plan?
  • Vulnerability Assessment vs. Penetration Testing: What’s the Difference?
  • Healthcare Cyber Security Trends: What You Need to Know Now and Going Forward
  • How To Perform a Cyber Security Risk Analysis For Any Organization.
HomeAccountPrivacy PolicyReturn & Refund PolicyTerms and ConditionsAbout UsContact Us

Return & Refund Policy - Terms and Conditions